UMTS and HSPA/HSPA+ and LTE Security Training:
UMTS and HSPA/HSPA+ and LTE Security Training Course Description
Having completed this UMTS and HSPA/HSPA+ and LTE Security Training course the participant will be able to understand how security is implemented, deployed, and managed in | HSPA/HSPA+ and LTE networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.
Your Registration Includes
- 3 days of UMTS and HSPA/HSPA+ and LTE Security Training with an expert instructor
- UMTS and HSPA/HSPA+ and LTE Security Electronic Course Guide
- 100% Satisfaction Guarantee
- Certificate of Completion
Resources:
- UMTS and HSPA/HSPA+ and LTE Security Training – https://www.wiley.com/
- UMTS and HSPA/HSPA+ and LTE Security Training – https://www.packtpub.com/
- UMTS and HSPA/HSPA+ and LTE Security – https://store.logicaloperations.com/
- UMTS and HSPA/HSPA+ and LTE Security – https://us.artechhouse.com/
- UMTS and HSPA/HSPA+– https://www.amazon.com/
Related Courses
- HSPA/HSPA+ Advanced Training
- HSPA/HSPA+ Network Planning and Design Training
- HSDPA Training Overview
- Advanced HSDPA Training
- HSUPA Training Overview
- LTE/HSPA Intertechnology Optimization Training
- LTE and UMTS/HSPA Location-Based Services for E911 Training
- HSPA/HSDPA/HSUPA Optimization Training
- UMTS/HSPA/HSPA+ and LTE Security Training
- UMTS Training | Universal Mobile Telecommunication System
- UMTS QoS Fundamentals Training
- UMTS Core Network Training
Customize It:
- If you are familiar with some aspects of UMTS and HSPA/HSPA+ and LTE Security Training, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the UMTS and HSPA/HSPA+ and LTE Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the UMTS and HSPA/HSPA+ and LTE Security Training course in a manner understandable to lay audiences.
Objectives:
After completing this UMTS and HSPA/HSPA+ and LTE Security Training course, attendees will be able to:
- The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in HSPA/HSPA+ and LTE radio and core network. The course focuses both on the air interface and the enhanced core network.
Course Outline:
Overview of Security Concepts
- Basic security concepts
- Authentication
- Privacy
- Integrity
- Authorization
- Non-repudiation
Encryption
- Encryption Technologies
- Cryptography Keys
- Symmetric and Asymmetric
- Ciphers
- Cipher Suites
- Certificates
Overview of Wireless Security Requirements
- Wireless security needs
- Basic GSM, GPRS, UMTS, and LTE security functions
GSM, EGPRS, UMTS/HSPA/HSPA+ and LTE Security Framework
- GSM, EGPRS and UMTS/HSPA/HSPA+ and LTE Security Functions
- GSM Security Review
- GPRS Security Review
- UMTS Security Overview
- LTE Security Overview
- Ciphering, Authentication, and Authorization Procedures
- RAN Security
- Core Network Security
- Lawful Interception (LI)
- Mobile Application Part Security
- MAPsec overview
UMTS Security Architecture
- GSM, EGPRS Security Architecture
- UMTS and HSPA/HSPA+ security features
- Network access mechanisms
- UMTS authentication and authorization procedures
- Key agreement
- Local Authentication
- UMTS ciphering procedures
- Security threats to UMTS and LTE
Security in UTRAN
- Typical threats in UTRAN
- Mutual authentication
- Cryptography for authentication
- UTRAN encryption
- Integrity protection of RRC signalling
Security in UMTS Core Network
- Typical Threats in Core Network
- Denial of Services
- IPSec
- Authentication Server
- Network Domain
- MAP application layer security
Authentication and Key Management (AKA)
- Authentication parameters
- AV and K
- RAND
- SQN and AK
- AMF and MAC
- CK and IK
- RES and X-RES
- AUTN and AUTS
- Normal AKA procedure
- AKA procedure in the AuC
- AKA procedure in the USIM
- AKA procedure in the VLR/SGSN
AKA Algorithms
- AKA Functions with their outputs
- Cryptographic functions and algorithms
- Key generating functions
- Authentication parameters
- Integrity function
- Confidentiality function
- f0, f1 and f1*
- f2, f3, and f4
- f5, f5*, f8 and f9
LTE (Long Term Evolution) Security
- Security procedures performed within the Evolved Packet System (EPS)
- Evolved Packet Core (EPC)
- Evolved UTRAN (E-UTRAN)
- LTE/SAE and Home (e)NB Security
- System Architecture Evolution (SAE) Security Architecture
- Authentication and Key Agreement
- HSS Authentication Data and MME
- Overview of Diameter Protocol
- Challenge-response Authentication and Key Agreement Procedure between MME and UE
- Confidentiality and Integrity of Signaling
- User Plane Confidentiality
- Cryptographic Network Separation
- Home (e) Node B security
- Threats
- Countermeasures
- Security Performance Measurements
- Managing Mobile App Security
LTE Security Procedures
- Security Procedures between UE and EPC Network Elements
- Security Procedures between UE and EPC Access Network Elements
- Security mechanisms for non-access stratum signaling
- Security interlocking between E-UTRAN and UTRAN
- Security interworking between E-UTRAN and GERAN
Whether you are looking for general information or have a specific question, we want to help!
Request More Information